Evolving Cloudflare's Threat Intelligence Platform: actionable, scalable, and ETL-less
Blog post from Cloudflare
Cloudflare's Threat Intelligence Platform (TIP) addresses the cybersecurity industry's "data gravity" problem by providing a centralized system that collects, aggregates, and organizes data on known and emerging cyber threats. Designed as a cloud-first, agentic-capable platform, it eliminates the need for complex ETL pipelines by using a sharded, SQLite-backed architecture that enables sub-second query latency, even when handling millions of events. By integrating with Cloudflare Workers and using GraphQL at the edge, the platform allows real-time visualization and automation of threat responses, enabling security teams to move from reactive to proactive defense. The TIP complements traditional SIEM systems by providing long-term, structured storage for threat events, enriched with historical actor patterns, and facilitates interoperability through STIX2 exports and automated rule generation via the Firewall API. With dynamic visualization tools like Sankey Diagrams, it helps users see patterns in the threat landscape and correlate disparate threat events into cohesive campaigns. The platform's human-in-the-loop intelligence integrates Requests for Information, allowing deep-dive investigations by Cloudforce One analysts, whose findings enhance the platform's automated defenses. By shifting the compute to the edge, the TIP ensures that intelligence is immediately accessible, enabling faster and more accurate decision-making, while its tiered access structure—Cloudforce One Essentials, Advantage, and Elite—caters to different customer needs and threat detection capabilities.